1 Information Security Association Our aim is to create productive environment to satisfy all the needs of citizens, business and local authorities in information security products and technologies. Chairman of council G.V. Emelyanov Corresponding member of the Cryptographic Academy of Russia, Russia, Corresponding member of Russian Engineering Academy Information Security Association • • • • • • • • • • • • Interregional public organization “Information Security Association” (ISA) was established in 2002 following the decision of the Federal Agency for Government Communication & Information and the State Technical Commission of Russia. ISA actively cooperates with: the Device of the Security Council of the Russian Federation, FSB of Russia, Federal service of technical and export control (FSTEC), Federal agency of information technologies (FAIT), other ministries and departments, other financial and economic structures. Articles of the Information Security Association (ISA) allow: to carry out the international projects, to be a member of different international public associations, to carry out foreign trade activities. 3 Information Security Association ISA is licensed by the FSB of Russia and the State Technical Commission of Russia for the activities at the information security market. The license gives rights: • to provide information security services, in • • • • particular the security over the sensitive confidential data To carry out research and developing projects relevant to information security products. to carry out projects that involve using the state secret data; To research, develop & market cryptographic products To provide after-sales technical support 4 Information Security Association ISA is ready to assist with the development of business contacts that may lead to: • quicker marketability of the products; • setting up joint ventures; • the organization of seminars, conferences and exhibitions; • training of IT specialists. 5 Information Security Association The enterprises making up the ISA give the full spectrum of services in design and support of integrated complex information security systems. • • • • • • • • • • • • • • • • • • • • • • Integral magazine IDS-Technology Aladdin Software Security R.D DialagueSience Jet Infosystems Inelt ComFax Swemel Moscow Department of Penza Research Electrotechnical Institute ( MD PREI) Scientific-and-production enterprise “Information Safety System Technologies” Special Computer-aided Design Bureau (OKB SAPR) Orbita RNT Saint Petersburg Regional Center for Protection of Information (SPRCPI ZAO) SecurIT Certificate Authority Kami Eureca Andek Infotecs Optima Elvis-plus • • • • • • • • • • • • • • • • • • • • • Ancud Validata SPURT ltd Infocript СryptoPro Computerization means and systems testing laboratory Ltd (LISSI Co. Ltd) Mezhdunarodnaya kniga - security papers (MK-SP) Systematic Stel Computer Sestems Scientific and Training Center of Information Security of Privolzhskky Federal District Kalugapribor Concern Systemprom Automatiki NII GUP Quant R&D Institute Gamma “Scientific-Technical Center “Atlas” Nizhni Novgorod Branch “Scientific-Technical Center “Atlas” Penza Branch “Scientific-Technical Center “Atlas” St. Petersburg Branch Penza Research Electrotechnical Institute (PREI) Central research institute of black metallurgy by P. Bardin (MAC RF "TsSRI Chermet") 6 Abitel Information Security Association The main activities of the ISA are determined by the services that the organizations comprising the ISA are able to provide: • Complex protection of information resources of • • • • • • • • corporate systems Application of cryptographic tools Information protection against outflow via technical channels Delivery of complex systems and tools of information security Delivery of protected technical tools Independent audit of information security of information objects Carrying out of researches and developments Management of export deliveries A professional training 7 Information Security Association Complex information security of corporate systems resources. The creation of complex systems of information security of local computer networks, the corporate automated systems constructed on the basis of general purpose networks, including the Internet, includes: • A predesign stage / planning (audit of information-communication • • • • • • • systems regarding information security, analysis of the initial data, preparation of offers to the customer); Designing of the complex information security systems; Implementation of complex information security system (delivery, installation of technical tools, training of the stuff); Application of cryptographic tools; Writing up procedures manuals, preparation for certification for the information security requirements; Pre-certification testing of corporate systems to ensure they comply with information security requirements; Guarantee and warranty service Outsourcing of the information corporate security systems Results: The creation of protected automated systems including management of complex information security system 8 Information Security Association Application of cryptographic tools The wide spectrum of cryptographic tools developed by the enterprises of ISA is used to create complex information security systems. These tools are: • • • • • • information security of data transmission information security in local (corporate) computer networks, including networks with outputs into the general network protected storage of the information databases, magnetic disks, etc. security of the information flows in their transfers between network users, remote access to the databases, etc. identification and authentication of users for the differentiation of access (including using of electronic tools with a key information e-token, touch memory, smarts - cards) information security against a falsification of electronic documents due to use of the electronic digital signatures and cryptography with an open key (PKI). 9 Information Security Association Information protection against outflow via technical channels • specialist audit and specialist hardware tools research which allow to • • • • detect if any unauthorized electronic tools were introduced into the communication channels and to define dangerous zones of information interception using the channel CERI (collateral electromagnetic radiations and inducings); information security of premises that are allocated for the confidential use delivery & installation of the information security systems to block the outflow of sensitive date using a channel CERI (collateral electromagnetic radiations and inducings), power and grounding (generators of noise, filters, etc.) networks information security of telephone sets using an installation of devices that block an unauthorized insertion of microphones into telephones (in case using a digital automatic telephone exchanges) information security of telephone sets using the channel of electroacoustic transformations and high-frequency imposing. 10 Information Security Association Delivery of complex information security systems and tools • information security tools against the unauthorized access (hardware, • • • • • • • software tools) development & management of information security policies that allow monitoring and control of the users of the automated systems information gathering about applications of the system detection & provision of prompt solutions to the events compromise the information security policy set on users’ workstations intrusions detection systems that provide an automatic detection and blockage of network attacks both external and internal analysis of the security of the systems that allows the discovery and repairs of weaknesses of the automated systems various implementation of protected e-mail boxes protected access points to the Internet for the corporate automated systems 11 Information Security Association Delivery of protected computer equipment The Association carries out a delivery of tools that are EMIproof according to customers’ technique requirements for processing of information of any secrecy level. These tools can be used at any objects of informatization without any further testing. 12 Information Security Association Independent information security audit of object of informatization • overall audit of information / communication systems • • • • • using expert and tool methods assessment of overall efficiency of security systems and tools audit report comprising: the analysis of network and information resources security, estimations of system vulnerability, recommendations for the perfection of information security system. 13 Information Security Association Carrying out of researches and developments The research and development works will be carried out at the ISA or ISA partners’ test basises and scientific laboratories. 14 Information Security Association Management of export deliveries Management of export deliveries of information security tools will be carried out in accordance with the current legislation. During the export contracts the Association will take the responsibility to organize all necessary examinations and compliances with the Russian authorities. 15 Information Security Association Professional training • Degree level courses • Training courses for qualified staff to allow continued professional development • Seminars on specific topic areas 16 Welcome to cooperation Information Security Association Kvant, ISA 15, 4-th Lihachevskij lane Moscow 125438 Russia tel/fax: +7 (095) 156-7102 tel. +7 (095) 154-6155, 782-3357, 17 http://www.azi.ru, e-mail: azi@azi.ru